You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: installing/installing_aws/ipi/installing-aws-localzone.adoc
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,13 +21,13 @@ AWS {zone-type} is an infrastructure that place Cloud Resources close to metropo
21
21
+
22
22
[WARNING]
23
23
====
24
-
If you have an AWS profile stored on your computer, it must not use a temporary session token that you generated while using a multi-factor authentication device. The cluster continues to use your current AWS credentials to create AWS resources for the entire life of the cluster, so you must use key-based, long-term credentials. To generate appropriate keys, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html[Managing Access Keys for IAM Users] in the AWS documentation. You can supply the keys when you run the installation program.
24
+
If you have an AWS profile stored on your computer, it must not use a temporary session token that you generated while using a multifactor authentication device. The cluster continues to use your current AWS credentials to create AWS resources for the entire life of the cluster, so you must use key-based, long-term credentials. To generate appropriate keys, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html[Managing Access Keys for IAM Users] in the AWS documentation. You can supply the keys when you run the installation program.
25
25
====
26
26
* You downloaded the AWS CLI and installed it on your computer. See link:https://docs.aws.amazon.com/cli/latest/userguide/install-bundle.html[Install the AWS CLI Using the Bundled Installer (Linux, macOS, or UNIX)] in the AWS documentation.
27
27
* If you use a firewall, you xref:../../../installing/install_config/configuring-firewall.adoc#configuring-firewall[configured it to allow the sites] that your cluster must access.
28
28
* You noted the region and supported link:https://aws.amazon.com/about-aws/global-infrastructure/localzones/locations[AWS Local Zones locations] to create the network resources in.
29
29
* You read the link:https://aws.amazon.com/about-aws/global-infrastructure/localzones/features/[AWS Local Zones features] in the AWS documentation.
30
-
* You added permissions for creating network resources that support AWS Local Zones to the Identity and Access Management (IAM) user or role. The following example enables a zone group that can provide a user or role access for creating network network resources that support AWS {zone-type}.
30
+
* You added permissions for creating network resources that support AWS Local Zones to the Identity and Access Management (IAM) user or role. The following example enables a zone group that can give a user or role access for creating network resources that support AWS {zone-type}.
31
31
+
32
32
.Example of an additional IAM policy with the `ec2:ModifyAvailabilityZoneGroup` permission attached to an IAM user or role.
== Installing a cluster in an existing VPC that has Local Zone subnets
139
139
140
-
You can install a cluster into an existing Amazon Virtual Private Cloud (VPC) on Amazon Web Services (AWS). The installation program provisions the rest of the required infrastructure, which you can further customize. To customize the installation, modify parameters in the `install-config.yaml` file before you install the cluster.
140
+
You can install a cluster into an existing Amazon Virtual Private Cloud (VPC) on Amazon Web Services (AWS). The installation program provisions the rest of the required infrastructure, which you can further customize. To customize the installation, change parameters in the `install-config.yaml` file before you install the cluster.
141
141
142
142
Installing a cluster on AWS into an existing VPC requires extending compute nodes to the edge of the Cloud Infrastructure by using AWS {zone-type}.
143
143
144
144
Local Zone subnets extend regular compute nodes to edge networks. Each edge compute nodes runs a user workload. After you create an Amazon Web Service (AWS) Local Zone environment, and you deploy your cluster, you can use edge compute nodes to create user workloads in Local Zone subnets.
145
145
146
146
[NOTE]
147
147
====
148
-
If you want to create private subnets, you must either modify the provided CloudFormation template or create your own template.
148
+
If you want to create private subnets, you must either change the provided CloudFormation template or create your own template.
149
149
====
150
150
151
-
You can use a provided CloudFormation template to create network resources. Additionally, you can modify a template to customize your infrastructure or use the information that they contain to create AWS resources according to your company's policies.
151
+
You can use a provided CloudFormation template to create network resources. Additionally, you can change a template to customize your infrastructure or use the information that they contain to create AWS resources according to your company's policies.
152
152
153
153
[IMPORTANT]
154
154
====
155
-
The steps for performing an installer-provisioned infrastructure installation are provided for example purposes only. Installing a cluster in an existing VPC requires that you have knowledge of the cloud provider and the installation process of {product-title}. You can use a CloudFormation template to assist you with completing these steps or to help model your own cluster installation. Instead of using the CloudFormation template to create resources, you can decide to use other methods for generating these resources.
155
+
The documentation provides the steps for performing an installer-provisioned infrastructure installation for example purposes only. Installing a cluster in an existing VPC requires that you have knowledge of the cloud provider and the installation process of {product-title}. You can use a CloudFormation template to assist you with completing these steps or to help model your own cluster installation. Instead of using the CloudFormation template to create resources, you can decide to use other methods for generating these resources.
The {rh-openstack} resources that the cluster API (CAPI) provider creates are tagged with the label `openshiftClusterID=<infraID>`.
82
86
83
-
You can define additional tags for the resources as values in the `HostedCluster.Spec.Platform.OpenStack.Tags` field of a YAML manifest that you use to create the hosted cluster. The tags are applied when you scale up the node pool.
87
+
You can define additional tags for the resources as values in the `HostedCluster.Spec.Platform.OpenStack.Tags` field of a YAML manifest that you use to create the hosted cluster. After you scale up the node pool, the tags apply to resources.
If you want to specify which{op-system} image to use when deploying node pools on and {hcp} and {rh-openstack-first} deployment, upload the image to the {rh-openstack} cloud. If you do not upload the image, the OpenStack Resource Controller (ORC) downloads an image from the {product-title} mirror and deletes it when the hosted cluster is deleted.
9
+
If you want to specify the{op-system} image to use when deploying node pools on {hcp} and {rh-openstack-first} deployment, upload the image to the {rh-openstack} cloud. If you do not upload the image, the OpenStack Resource Controller (ORC) downloads an image from the {product-title} mirror and deletes the image after deletion of the hosted cluster.
Copy file name to clipboardExpand all lines: modules/nw-networkpolicy-allow-application-all-namespaces.adoc
+4-13Lines changed: 4 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ ifndef::microshift[]
31
31
endif::microshift[]
32
32
* You installed the OpenShift CLI (`oc`).
33
33
ifndef::microshift[]
34
-
* You are logged in to the cluster with a user with `{role}` privileges.
34
+
* You logged in to the cluster with a user with `{role}` privileges.
35
35
endif::microshift[]
36
36
* You are working in the namespace that the {name} policy applies to.
37
37
@@ -71,7 +71,7 @@ spec:
71
71
+
72
72
[NOTE]
73
73
====
74
-
By default, if you omit specifying a `namespaceSelector`it does not select any namespaces, which means the policy allows traffic only from the namespace the network policy is deployed to.
74
+
By default, if you do not specify a `namespaceSelector`parameter in the policy object, no namespaces get selected. This means the policy allows traffic only from the namespace where the network policy deployes.
75
75
====
76
76
77
77
. Apply the policy by entering the following command:
@@ -81,16 +81,7 @@ By default, if you omit specifying a `namespaceSelector` it does not select any
81
81
$ oc apply -f web-allow-all-namespaces.yaml
82
82
----
83
83
+
84
-
.Example output
85
-
[source,terminal]
86
-
----
87
-
ifndef::multi[]
88
-
networkpolicy.networking.k8s.io/web-allow-all-namespaces created
89
-
endif::multi[]
90
-
ifdef::multi[]
91
-
multinetworkpolicy.k8s.cni.cncf.io/web-allow-all-namespaces created
92
-
endif::multi[]
93
-
----
84
+
Successful output lists the name of the policy object and the `created` status.
94
85
95
86
.Verification
96
87
@@ -108,7 +99,7 @@ $ oc run web --namespace=default --image=nginx --labels="app=web" --expose --por
108
99
$ oc run test-$RANDOM --namespace=secondary --rm -i -t --image=alpine -- sh
109
100
----
110
101
111
-
. Run the following command in the shell and observe that the request is allowed:
102
+
. Run the following command in the shell and observe that the service allows the request:
Copy file name to clipboardExpand all lines: modules/nw-networkpolicy-allow-application-particular-namespace.adoc
+4-20Lines changed: 4 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ endif::microshift[]
25
25
26
26
Follow this procedure to configure a policy that allows traffic to a pod with the label `app=web` from a particular namespace. You might want to do this to:
27
27
28
-
* Restrict traffic to a production database only to namespaces where production workloads are deployed.
28
+
* Restrict traffic to a production database only to namespaces that have production workloads deployed.
29
29
* Enable monitoring tools deployed to a particular namespace to scrape metrics from the current namespace.
30
30
31
31
.Prerequisites
@@ -34,7 +34,7 @@ ifndef::microshift[]
34
34
endif::microshift[]
35
35
* You installed the OpenShift CLI (`oc`).
36
36
ifndef::microshift[]
37
-
* You are logged in to the cluster with a user with `{role}` privileges.
37
+
* You logged in to the cluster with a user with `{role}` privileges.
38
38
endif::microshift[]
39
39
* You are working in the namespace that the {name} policy applies to.
40
40
@@ -81,16 +81,7 @@ spec:
81
81
$ oc apply -f web-allow-prod.yaml
82
82
----
83
83
+
84
-
.Example output
85
-
[source,terminal]
86
-
----
87
-
ifndef::multi[]
88
-
networkpolicy.networking.k8s.io/web-allow-prod created
89
-
endif::multi[]
90
-
ifdef::multi[]
91
-
multinetworkpolicy.k8s.cni.cncf.io/web-allow-prod created
92
-
endif::multi[]
93
-
----
84
+
Successful output lists the name of the policy object and the `created` status.
$ oc run test-$RANDOM --namespace=dev --rm -i -t --image=alpine -- sh
137
128
----
138
129
139
-
. Run the following command in the shell and observe that the request is blocked:
130
+
. Run the following command in the shell and observe the reason for the blocked request. For example, expected output states `wget: download timed out`.
140
131
+
141
132
[source,terminal]
142
133
----
143
134
# wget -qO- --timeout=2 http://web.default
144
135
----
145
-
+
146
-
.Expected output
147
-
+
148
-
[source,terminal]
149
-
----
150
-
wget: download timed out
151
-
----
152
136
153
137
. Run the following command to deploy an `alpine` image in the `prod` namespace and start a shell:
2 packets transmitted, 0 received, 100% packet loss, time 2041ms
183
174
----
184
175
185
-
.. Ping the IP address saved in the `POD_IP` shell environment variable from the pod named `client` in the `verify-audit-logging` namespace and confirm that all packets are allowed:
176
+
.. From the client pod in the `verify-audit-logging` namespace, ping the IP address stored in the `POD_IP shell` environment variable and confirm the system allows all packets.
0 commit comments